default search action
Yongjun Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j50]Yongjun Ren, Long Chen, Yongmei Bai, Jiale Ye, Yekang Zhao:
Blockchain-based cross-domain query integrity verification mechanism for outsourced database. Comput. Stand. Interfaces 92: 103926 (2025) - 2024
- [j49]Kui Zhu, Yongjun Ren, Jian Shen, Pandi Vijayakumar, Pradip Kumar Sharma:
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs. Digit. Commun. Networks 10(1): 142-149 (2024) - [j48]Mingjia Han, Xinyi Yang, Huachang Su, Yekang Zhao, Ding Huang, Yongjun Ren:
Spatio-Temporal Big Data Collaborative Storage Mechanism Based on Incremental Aggregation Subvector Commitment in On-Chain and Off-Chain Systems. ISPRS Int. J. Geo Inf. 13(8): 280 (2024) - [j47]Yangyang Guo, Hongye Liu, Yaojin Sun, Yongjun Ren:
Virtual human pose estimation in a fire education system for children with autism spectrum disorders. Multim. Syst. 30(2): 84 (2024) - [j46]Xiaofeng Yu, Ruyan Liu, Lewis Nkenyereye, Zhiming Wang, Yongjun Ren:
ACRS-Raft: A Raft Consensus Protocol for Adaptive Data Maintenance in the Metaverse Based on Cauchy Reed-Solomon Codes. IEEE Trans. Consumer Electron. 70(1): 3792-3801 (2024) - [j45]Fangpeng Jin, Mi Zou, Xiaoyun Peng, Hua Lei, Yongjun Ren:
Deep Learning-Enhanced Internet of Things for Activity Recognition in Post-Stroke Rehabilitation. IEEE J. Biomed. Health Informatics 28(7): 3851-3859 (2024) - [j44]Guowei Fang, Yi Sun, Mutiq Almutiq, Wei Zhou, Yekang Zhao, Yongjun Ren:
Distributed Medical Data Storage Mechanism Based on Proof of Retrievability and Vector Commitment for Metaverse Services. IEEE J. Biomed. Health Informatics 28(11): 6298-6307 (2024) - [j43]Le Sun, Chenyang Li, Yongjun Ren, Yanchun Zhang:
A Multitask Dynamic Graph Attention Autoencoder for Imbalanced Multilabel Time Series Classification. IEEE Trans. Neural Networks Learn. Syst. 35(9): 11829-11842 (2024) - [j42]Yongjun Ren, Zhiying Lv, Neal N. Xiong, Jin Wang:
HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based Metaverse. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 188:1-188:23 (2024) - 2023
- [j41]Haitao Deng, Jing Hu, Rohit Sharma, Mingsen Mo, Yongjun Ren:
NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory. Comput. Commun. 206: 1-9 (2023) - [j40]Qiang Wu, Zhaoyang Han, Ghulam Mohiuddin, Yongjun Ren:
Distributed Timestamp Mechanism Based on Verifiable Delay Functions. Comput. Syst. Sci. Eng. 44(2): 1633-1646 (2023) - [j39]Jin Wang, Wei Ou, Osama Alfarraj, Amr Tolba, Gwang-Jun Kim, Yongjun Ren:
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain. Comput. Syst. Sci. Eng. 45(2): 1805-1819 (2023) - [j38]Xiaorui Zhang, Xianglong Zeng, Wei Sun, Yongjun Ren, Tong Xu:
Multimodal Spatiotemporal Feature Map for Dynamic Gesture Recognition. Comput. Syst. Sci. Eng. 46(1): 671-686 (2023) - [j37]Yongjun Ren, Ding Huang, Wenhai Wang, Xiaofeng Yu:
BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data. Future Gener. Comput. Syst. 138: 328-338 (2023) - [j36]Tao Zhang, Jian Shen, Chin-Feng Lai, Sai Ji, Yongjun Ren:
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems. Future Gener. Comput. Syst. 140: 299-310 (2023) - [j35]Xiaofeng Yu, Shunzhi Zhu, Yongjun Ren:
Continuous trajectory similarity search with result diversification. Future Gener. Comput. Syst. 143: 392-400 (2023) - [j34]Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu, Yongjun Ren:
Blockchain Data Availability Scheme with Strong Data Privacy Protection. Inf. 14(2): 88 (2023) - [j33]Pengchong Han, Zhouyang Zhang, Shan Ji, Xiaowan Wang, Liang Liu, Yongjun Ren:
Access control mechanism for the Internet of Things based on blockchain and inner product encryption. J. Inf. Secur. Appl. 74: 103446 (2023) - [j32]Ruyan Liu, Xiaofeng Yu, Yuan Yuan, Yongjun Ren:
BTDSI: A blockchain-based trusted data storage mechanism for Industry 5.0. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101674 (2023) - [j31]Jin Wang, Jiahao Chen, Neal Xiong, Osama Alfarraj, Amr Tolba, Yongjun Ren:
S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT. ACM Trans. Internet Techn. 23(3): 42:1-42:23 (2023) - [c28]Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu:
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture. Inscrypt (2) 2023: 130-149 - 2022
- [j30]Jin Wang, Jiahao Chen, Yongjun Ren, Pradip Kumar Sharma, Osama Alfarraj, Amr Tolba:
Data security storage mechanism based on blockchain industrial Internet of Things. Comput. Ind. Eng. 164: 107903 (2022) - [j29]Tao Li, Yanqing Wang, Yongjun Ren, Yongzhen Ren, Qi Qian, Xi Gong:
Nonnegative matrix factorization-based privacy-preserving collaborative filtering on cloud computing. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j28]Qiang Wu, Liang Xi, Shiren Wang, Shan Ji, Shenqing Wang, Yongjun Ren:
Verifiable Delay Function and Its Blockchain-Related Application: A Survey. Sensors 22(19): 7524 (2022) - [j27]Yongjun Ren, Fujian Zhu, Jin Wang, Pradip Kumar Sharma, Uttam Ghosh:
Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 23(2): 1639-1648 (2022) - 2021
- [j26]Jiang Xu, Ling Wang, Xinyu Liu, Xiujuan Feng, Yongjun Ren, Jinyue Xia:
Front-end Control Mechanism of Electronic Records. Comput. Syst. Sci. Eng. 39(3): 337-349 (2021) - [j25]Yongjun Ren, Yan Leng, Jian Qi, Pradip Kumar Sharma, Jin Wang, Zafer Al-Makhadmeh, Amr Tolba:
Multiple cloud storage mechanism based on blockchain in smart homes. Future Gener. Comput. Syst. 115: 304-313 (2021) - [j24]Tao Li, Jie Chen, Lina Wang, Yongjun Ren:
Lightning location method based on improved fuzzy C-means clustering algorithm. Int. J. Sens. Networks 35(3): 133-142 (2021) - [j23]Tao Li, Wenduo Xu, Lina Wang, Ningpeng Li, Yongjun Ren, Jinyue Xia:
An Integrated Artificial Neural Network-based Precipitation Revision Model. KSII Trans. Internet Inf. Syst. 15(5): 1690-1707 (2021) - [j22]Yongjun Ren, Fujian Zhu, Kui Zhu, Pradip Kumar Sharma, Jin Wang:
Blockchain-based trust establishment mechanism in the internet of multimedia things. Multim. Tools Appl. 80(20): 30653-30676 (2021) - [j21]Tianqi Zhou, Jian Shen, Yongjun Ren, Sai Ji:
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems. Secur. Commun. Networks 2021: 1864514:1-1864514:8 (2021) - [j20]Qingfeng Zhu, Sai Ji, Jian Shen, Yongjun Ren:
Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs. Sensors 21(11): 3658 (2021) - [j19]Yongjun Ren, Jian Qi, Yepeng Liu, Jin Wang, Gwang-Jun Kim:
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator. ACM Trans. Internet Techn. 21(1): 5:1-5:19 (2021) - [c27]Kui Zhu, Yongjun Ren, Qingfeng Zhu:
A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance. DSC 2021: 1-6 - [c26]Tianqi Zhou, Jian Shen, Sai Ji, Yongjun Ren, Mingwu Zhang:
Key Exposure Resistant Group Key Agreement Protocol. ProvSec 2021: 83-97 - 2020
- [j18]Lina Wang, Chaoyao Shen, Sheng Yuan, Yongjun Ren, Yong Wang, Jinyue Xia:
Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde. Int. J. Embed. Syst. 13(3): 341-351 (2020) - [j17]Yongjun Ren, Fujian Zhu, Pradip Kumar Sharma, Tian Wang, Jin Wang, Osama Alfarraj, Amr Tolba:
Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things. Sensors 20(1): 207 (2020) - [j16]Tianqi Zhou, Jian Shen, Sai Ji, Yongjun Ren, Leiming Yan:
Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices. Wirel. Commun. Mob. Comput. 2020: 8842885:1-8842885:11 (2020) - [c25]Tao Li, Lei Wang, Yongjun Ren, Lingyun Wang, Qi Qian:
Multi-source Meteorological Observation Data Quality Control Algorithm Based on Data Mining. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 699-704
2010 – 2019
- 2019
- [j15]Yongjun Ren, Jin Wang, Xiujuan Feng, Geumran Youn, Jeong-Uk Kim:
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment. Clust. Comput. 22(Suppl 1): 1805-1814 (2019) - [j14]Tao Li, Lei Wang, Yongjun Ren, Xiang Li, Jinyue Xia, Ran An:
An efficient method for meteorological nephogram recognition in cloud environment. EURASIP J. Wirel. Commun. Netw. 2019: 273 (2019) - [j13]Yongjun Ren, Wenyue Ma, Xiaohua Wang:
A new method of text information hiding based on open channel. Int. J. High Perform. Comput. Netw. 14(3): 325-332 (2019) - [j12]Lina Wang, Chao Feng, Yongjun Ren, Jinyue Xia:
Local outlier detection based on information entropy weighting. Int. J. Sens. Networks 30(4): 207-217 (2019) - [j11]Yepeng Liu, Yongjun Ren, Chunpeng Ge, Jinyue Xia, Qirun Wang:
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system. J. Inf. Secur. Appl. 47: 125-131 (2019) - [j10]Yongjun Ren, Yan Leng, Fujian Zhu, Jin Wang, Hye-Jin Kim:
Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network. Sensors 19(10): 2395 (2019) - [c24]Tao Li, Yongzhen Ren, Yongjun Ren, Lina Wang, Lingyun Wang, Lei Wang:
NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing. iThings/GreenCom/CPSCom/SmartData 2019: 476-481 - [c23]Tao Li, Lei Wang, Yongjun Ren, Xiang Li:
A Nephogram Recognition Algorithm Based on Cloud Computing Platform. iThings/GreenCom/CPSCom/SmartData 2019: 482-487 - 2018
- [j9]Yongjun Ren, Yepeng Liu, Sai Ji, Arun Kumar Sangaiah, Jin Wang:
Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks. Mob. Inf. Syst. 2018: 6874158:1-6874158:10 (2018) - [j8]Jian Shen, Shaohua Chang, Qi Liu, Jun Shen, Yongjun Ren:
Implicit authentication protocol and self-healing key management for WBANs. Multim. Tools Appl. 77(9): 11381-11401 (2018) - [j7]Chen Wang, Jian Shen, Qi Liu, Yongjun Ren, Tong Li:
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. Secur. Commun. Networks 2018: 3680851:1-3680851:7 (2018) - [c22]Yongjun Ren, Yepeng Liu, Chengshan Qian:
Digital Continuity Guarantee Based on Data Consistency in Cloud Storage. ICCCS (3) 2018: 3-11 - [c21]Yongjun Ren, Lin Zhou, Yepeng Liu, Xiaorui Zhang:
Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage. ICCCS (3) 2018: 174-183 - [c20]Jiang Xu, Jian Zhang, Yongjun Ren, Hye-Jin Kim:
Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data Environment. ICCCS (1) 2018: 456-466 - [c19]Yongjun Ren, Linhui Kong, Yepeng Liu, Jin Wang:
Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage. ICCCS (2) 2018: 633-642 - 2016
- [j6]Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Comput. J. 59(7): 970-982 (2016) - [j5]Yongjun Ren, Jian Shen, Yuhui Zheng, Jin Wang, Han-Chieh Chao:
Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl. 9(5): 854-863 (2016) - [c18]Jian Shen, Anxi Wang, Chen Wang, Yongjun Ren, Xingming Sun:
A RFID Based Localization Algorithm for Wireless Sensor Networks. ICCCS (2) 2016: 275-285 - 2015
- [j4]Jin Han, Jin Shi, Yongjun Ren:
一种基于区域划分的DTN路由算法 (DTN Routing Algorithm Based on Region Segmentation). 计算机科学 42(10): 113-116 (2015) - [c17]Jian Shen, Dengzhi Liu, Yongjun Ren, Sai Ji, Jin Wang, Dongmin Choi:
A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine. CBD 2015: 267-274 - [c16]Yongjun Ren, Yaping Cheng, Jin Wang, Liming Fang:
Data protection based on multifunction digital watermark in wireless sensor network. ICCST 2015: 37-41 - [c15]Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang:
Reliable access control for multi-authority in cloud storage. ICCST 2015: 113-116 - [c14]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Outsourced data tagging via authority and delegable auditing for cloud storage. ICCST 2015: 131-134 - [c13]Yongjun Ren, Jin Han, Jin Wang, Liming Fang:
Privacy-preserving proof of storage in large group. ICCST 2015: 269-272 - 2014
- [c12]Yongjun Ren, Yaping Chen, Jin Wang, Liming Fang:
Leakage Resilient Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 706-709 - [c11]Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang:
Attributed Based Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 710-713 - [c10]Yongjun Ren, Jiang Xu, Jin Wang, Liming Fang:
Oriented Group Provable Data Possession in Public Cloud. IIH-MSP 2014: 775-778 - [c9]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. IIH-MSP 2014: 779-782 - [c8]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 795-798 - [c7]Jian Shen, Haowen Tan, Sai Ji, Yongjun Ren, Jin Wang:
A Comparative Survey on RFID Grouping Authentication Protocols. ICS 2014: 982-993 - [c6]Jian Shen, Haowen Tan, Yongjun Ren, Yuhui Zheng, Jin Wang:
A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers. ICS 2014: 2162-2171 - 2013
- [j3]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Fuzzy conditional proxy re-encryption. Sci. China Inf. Sci. 56(5): 1-13 (2013) - [c5]Jian Shen, Jin Wang, Yongjun Ren, Jianwei Zhang, Shunfeng Wang:
Efficient Key Management Scheme for SCADA System. EMC/HumanCom 2013: 619-625 - 2010
- [j2]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Decryptable Public Key Encryption with Keyword Search Schemes. J. Digit. Content Technol. its Appl. 4(9): 141-150 (2010) - [j1]Liming Fang, Willy Susilo, Yongjun Ren, Chunpeng Ge, Jiandong Wang:
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. J. Digit. Content Technol. its Appl. 4(9): 151-160 (2010) - [c4]Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Improved unidirectional chosen-ciphertext secure proxy re-encryption. WCNIS 2010: 476-480 - [c3]Guoan Zhao, Canghai Tan, Yongjun Ren, Liming Fang:
An efficient unlinkable secret handshake protocol without ROM. WCNIS 2010: 486-490
2000 – 2009
- 2008
- [c2]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. CIS (1) 2008: 326-330 - [i2]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptol. ePrint Arch. 2008: 139 (2008) - [i1]Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian:
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2008: 479 (2008) - 2007
- [c1]Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang:
Identity-Based Key Issuing Protocol for Ad Hoc Networks. CIS 2007: 917-921
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint